Checkpoint Security Mcqs
Q.1: Which of the following signs on methods are possible in the Client Authentication in VPN-1?[
A. Partial Automatic
B. Fully Automatic
C. Partial Automatic
D. Encrypted Sign on
Q.2: Which type of NAT will be used by Adrian during the creation of a VPN between two sites, 10.1.1.0/24 and 192.168.1.0/16?x
A. Static NAT
B. Dynamic NAT
C. Hide NAT
D. None
Q.3: Which of the following factors should be kept in mind to improve the performance of the Enforcement module? (Select all suitable options)
A. Remove the unused rules
B. Enable log for all the rules
C. Keep the mostly used rules at the top%
D. Collate the rules
Q.4: __________ TCP flag can launch a DoS attack.,
A. ACK
B. FIN
C. SYN
D. SYN/ACK
Q.5: Which of the following are included while taking the backup of the VPN-1 configuration? (Select all suitable options)u
A. Global properties
B. Objects
C. Rule base
D. License
Q.6: What happens during the Tunnel Mode?$
A. It encrypts the entire packet
B. It encrypts the data portion
C. It encrypts the header portion
D. No encryption occurs
Q.7: How many TCP flags are there in the Checkpoint Security?8
A. 3
B. 2
C. 6
D. 8
Q.8: Which SmartConsole application will you use when you want to implement a new security policy for your network?n
A. SmartView Status
B. SmartView Tracker
C. SmartDashboard
D. SmartView Monitor
Q.9: Where will you place the Stealth rule in the Rule Base?7
A. At the top
B. Anywhere
C. At the bottom
D. In the middle
Q.10: Which of the following tools can be used to monitor the Packets?@
A. Ethereal
B. Nessus
C. TCPDUMP
D. Snort

Related Mcqs

All Subject Mcqs